Young-Gab Kim, Jin-Woo Kim, Sung-Ook Shin, D. Baik
Software development based on the software product-line can develop software products more easily and fast by reusing the developed core assets. One of key issues of software product-line is to handle variability between product families. That is, the variation management for software product-line decides the success of software development. There are considerable researches relating to model the variability in software product-line. However, the existing researches do not explicitly define artifacts and any relevant relationships between them used in each process. Therefore, in this paper, processes and artifacts of each process to manage uniformly variability over the life cycle of software product-line are proposed. Furthermore, in order to show how to apply those into a specific domain, especially electronic medical record (EMR) system, case study is presented
{"title":"Managing Variability for Software Product-Line","authors":"Young-Gab Kim, Jin-Woo Kim, Sung-Ook Shin, D. Baik","doi":"10.1109/SERA.2006.45","DOIUrl":"https://doi.org/10.1109/SERA.2006.45","url":null,"abstract":"Software development based on the software product-line can develop software products more easily and fast by reusing the developed core assets. One of key issues of software product-line is to handle variability between product families. That is, the variation management for software product-line decides the success of software development. There are considerable researches relating to model the variability in software product-line. However, the existing researches do not explicitly define artifacts and any relevant relationships between them used in each process. Therefore, in this paper, processes and artifacts of each process to manage uniformly variability over the life cycle of software product-line are proposed. Furthermore, in order to show how to apply those into a specific domain, especially electronic medical record (EMR) system, case study is presented","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Orthogonal defect classification (ODC) is an advanced software engineering technique to provide in-process feedback to developers and testers using defect data. ODC institutionalization in a large organization involves some challenging roadblocks such as the poor quality of the collected data leading to wrong analysis. In this paper, we have proposed a technique ('Harmony Matrix') to improve the data collection process. The ODC Harmony Matrix has useful applications. At the individual defect level, results can be used to raise alerts to practitioners at the point of data collection if a low probability combination is chosen. At the higher level, the ODC Harmony Matrix helps in monitoring the quality of the collected ODC data. The ODC Harmony Matrix complements other approaches to monitor and enhances the ODC data collection process and helps in successful ODC institutionalization, ultimately improving both the product and the process. The paper also describes precautions to take while using this approach
{"title":"Monitoring and Improving the Quality of ODC Data using the \"ODC Harmony Matrices\": A Case Study","authors":"Nirav Saraiya, Jason E. Lohner, Jongmoon Baik","doi":"10.1109/SERA.2006.52","DOIUrl":"https://doi.org/10.1109/SERA.2006.52","url":null,"abstract":"Orthogonal defect classification (ODC) is an advanced software engineering technique to provide in-process feedback to developers and testers using defect data. ODC institutionalization in a large organization involves some challenging roadblocks such as the poor quality of the collected data leading to wrong analysis. In this paper, we have proposed a technique ('Harmony Matrix') to improve the data collection process. The ODC Harmony Matrix has useful applications. At the individual defect level, results can be used to raise alerts to practitioners at the point of data collection if a low probability combination is chosen. At the higher level, the ODC Harmony Matrix helps in monitoring the quality of the collected ODC data. The ODC Harmony Matrix complements other approaches to monitor and enhances the ODC data collection process and helps in successful ODC institutionalization, ultimately improving both the product and the process. The paper also describes precautions to take while using this approach","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lee-Sub Lee, Kyung-Ryong Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon
Although Jabber started from the instance messaging protocol, it became one of the most important toolkits for developing distributed applications. The existing Jabber authentication model doesn't support a mechanism to enable a client to access the servers in another domain directly. This limitation causes data duplication and synchronization problems in developing Jabber based distributed applications. Thus the study proposes a novel IDA (inter-domain authentication). While the well-known Kerberos authentication protocol provides IRA (inter-realm authentication), it requires all realms to implement Kerberos authentication mechanisms. Thus this cannot be used for developing Jabber services which contains various authentication mechanisms simultaneously. The study also presents the verification of security completeness with formal method, BAN logic
{"title":"An Inter-Domain Authentication Mechanism for XMPP/Jabber","authors":"Lee-Sub Lee, Kyung-Ryong Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon","doi":"10.1109/SERA.2006.15","DOIUrl":"https://doi.org/10.1109/SERA.2006.15","url":null,"abstract":"Although Jabber started from the instance messaging protocol, it became one of the most important toolkits for developing distributed applications. The existing Jabber authentication model doesn't support a mechanism to enable a client to access the servers in another domain directly. This limitation causes data duplication and synchronization problems in developing Jabber based distributed applications. Thus the study proposes a novel IDA (inter-domain authentication). While the well-known Kerberos authentication protocol provides IRA (inter-realm authentication), it requires all realms to implement Kerberos authentication mechanisms. Thus this cannot be used for developing Jabber services which contains various authentication mechanisms simultaneously. The study also presents the verification of security completeness with formal method, BAN logic","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
User access control is one of the core parts in the developing Internet field. However, in home network service platform and Web service platform, there is no concrete research yet. Therefore, in this paper, we propose the supplemented authorization policy management framework based on RBAC model in the network environment, especially, OSGi service platform and Web service platform. The proposed access control framework tries to enhance the efficiency, assure the privacy, and provide the convenience at the same time. In conclusion, we provide the base to implement the service platform by proposing the effective, safe and convenient framework in authorization and user administration part
{"title":"An Effective Policy Management Framework Using RBAC model for Service Platform based on Components","authors":"Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, D. Baik","doi":"10.1109/SERA.2006.12","DOIUrl":"https://doi.org/10.1109/SERA.2006.12","url":null,"abstract":"User access control is one of the core parts in the developing Internet field. However, in home network service platform and Web service platform, there is no concrete research yet. Therefore, in this paper, we propose the supplemented authorization policy management framework based on RBAC model in the network environment, especially, OSGi service platform and Web service platform. The proposed access control framework tries to enhance the efficiency, assure the privacy, and provide the convenience at the same time. In conclusion, we provide the base to implement the service platform by proposing the effective, safe and convenient framework in authorization and user administration part","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The job-shop scheduling problem is concerned with allocating limited resources to operations over time. Although the job shop scheduling has an important role in various fields, it is one of the most difficult problems in combinational optimization. In this paper, we propose a new scheduling technique that combines Ant Colony Optimization (ACO) with GT method in order to realize effective scheduling. ACO approach has been applied recently to several combinational optimization problems, e.g., TSP and scheduling problem. However, no studies have ever seen the approach of applying hybrid ACO to job-shop problems. Experimental results using benchmark data show improvement comparison with a conventional scheduling technique.
{"title":"Apriori, Association Rules, Data Mining,Frequent Itemsets Mining (FIM), Parallel Computing","authors":"M. Yoshikawa, H. Terai","doi":"10.1109/SERA.2006.17","DOIUrl":"https://doi.org/10.1109/SERA.2006.17","url":null,"abstract":"The job-shop scheduling problem is concerned with allocating limited resources to operations over time. Although the job shop scheduling has an important role in various fields, it is one of the most difficult problems in combinational optimization. In this paper, we propose a new scheduling technique that combines Ant Colony Optimization (ACO) with GT method in order to realize effective scheduling. ACO approach has been applied recently to several combinational optimization problems, e.g., TSP and scheduling problem. However, no studies have ever seen the approach of applying hybrid ACO to job-shop problems. Experimental results using benchmark data show improvement comparison with a conventional scheduling technique.","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growing competition in the global marketplace, the call center has become an essential part for many companies. The outbound technology of call center plays a very important role in customer relationship management (CRM) and marketing. The call center of the large service companies usually has the characteristics of wide geographical distribution, high volume of calls, high efficiency and centralized data processing. With the establishment of IP network infrastructure in many large companies, a solution of a distributed IP-based predictive dialing system is discussed, which includes the architectural design, network topological structure and system functions. In the end, the benefit of developing a predictive dialing system using the virtual call center is discussed
{"title":"Research on Predictive Dialing System Based on Distributed Call Center","authors":"Linhai Qi, S. Ma, Keqin Liu","doi":"10.1109/SERA.2006.58","DOIUrl":"https://doi.org/10.1109/SERA.2006.58","url":null,"abstract":"With the growing competition in the global marketplace, the call center has become an essential part for many companies. The outbound technology of call center plays a very important role in customer relationship management (CRM) and marketing. The call center of the large service companies usually has the characteristics of wide geographical distribution, high volume of calls, high efficiency and centralized data processing. With the establishment of IP network infrastructure in many large companies, a solution of a distributed IP-based predictive dialing system is discussed, which includes the architectural design, network topological structure and system functions. In the end, the benefit of developing a predictive dialing system using the virtual call center is discussed","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyung-Sang Sung, Seung-Heon Lee, Bo-Hyun Wang, H. Oh
Digital watermarking is an insertion technique where specific data that represents copyrights and ownership of multimedia contents such as audio, video, image and texts are inserted, which is a method to prevent illegal distribution, or copying of the product without proper authorization from maker or owner. In this research, unlike the existing image watermarking method wherein watermark is done to the frame itself, a model which extracts audio information within the moving picture, inserts image watermark into the extracted audio information which represents the owner, then combines original image together with digital audio watermark image. Also, suggests a model that improves security of watermark itself, by conducting pre-processing of watermark
{"title":"Digital Watermark System based on improved security through Pre-Processing of watermarked data using Information of Image Discrete Frequency","authors":"Kyung-Sang Sung, Seung-Heon Lee, Bo-Hyun Wang, H. Oh","doi":"10.1109/SERA.2006.29","DOIUrl":"https://doi.org/10.1109/SERA.2006.29","url":null,"abstract":"Digital watermarking is an insertion technique where specific data that represents copyrights and ownership of multimedia contents such as audio, video, image and texts are inserted, which is a method to prevent illegal distribution, or copying of the product without proper authorization from maker or owner. In this research, unlike the existing image watermarking method wherein watermark is done to the frame itself, a model which extracts audio information within the moving picture, inserts image watermark into the extracted audio information which represents the owner, then combines original image together with digital audio watermark image. Also, suggests a model that improves security of watermark itself, by conducting pre-processing of watermark","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128795075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software test is a very important phase in software development, and an important means to ensure the software's reliability. Path-oriented testing is a main approach in software test. In this paper, an automated test data generation method for linear approximation of bifurcation function is proposed. Combined with predicate slice and definition-use-control (DUG) expression of function, an innovative algorithm for path-oriented testing and automated test data generation is designed. This new algorithm, incorporating DUC expression, can determine whether the sub-path is feasible from the source point. It can also effectively decrease the adverse influence of infeasible path to the algorithm performance. Analysis shows, compared with other existing algorithms that utilize the minimization of bifurcation function method only, that this new algorithm can decrease the number of test cases considerably and increase the test efficiency
{"title":"Automated Test Data Generation Based on Program Execution","authors":"Junyi Li, Jiaguang Sun, Yingping Lu","doi":"10.1109/SERA.2006.20","DOIUrl":"https://doi.org/10.1109/SERA.2006.20","url":null,"abstract":"Software test is a very important phase in software development, and an important means to ensure the software's reliability. Path-oriented testing is a main approach in software test. In this paper, an automated test data generation method for linear approximation of bifurcation function is proposed. Combined with predicate slice and definition-use-control (DUG) expression of function, an innovative algorithm for path-oriented testing and automated test data generation is designed. This new algorithm, incorporating DUC expression, can determine whether the sub-path is feasible from the source point. It can also effectively decrease the adverse influence of infeasible path to the algorithm performance. Analysis shows, compared with other existing algorithms that utilize the minimization of bifurcation function method only, that this new algorithm can decrease the number of test cases considerably and increase the test efficiency","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Settas, S. Bibi, P. Sfetsos, I. Stamelos, V. Gerogiannis
In spite of numerous traditional and agile software project management models proposed, process and project modeling still remains an open issue. This paper proposes a Bayesian network (BN) approach for modeling software project management antipatterns. This approach provides a framework for project managers, who would like to model the cause-effect relationships that underlie an antipattern, taking into account the inherent uncertainty of a software project. The approach is exemplified through a specific BN model of an antipattern. The antipattern is modeled using the empirical results of a controlled experiment on extreme programming (XP) that investigated the impact of developer personalities and temperaments on communication, collaboration-pair viability and effectiveness in pair programming. The resulting BN model provides the precise mathematical model of a project management antipattern and can be used to measure and handle uncertainty in mathematical terms
{"title":"Using Bayesian Belief Networks to Model Software Project Management Antipatterns","authors":"D. Settas, S. Bibi, P. Sfetsos, I. Stamelos, V. Gerogiannis","doi":"10.1109/SERA.2006.68","DOIUrl":"https://doi.org/10.1109/SERA.2006.68","url":null,"abstract":"In spite of numerous traditional and agile software project management models proposed, process and project modeling still remains an open issue. This paper proposes a Bayesian network (BN) approach for modeling software project management antipatterns. This approach provides a framework for project managers, who would like to model the cause-effect relationships that underlie an antipattern, taking into account the inherent uncertainty of a software project. The approach is exemplified through a specific BN model of an antipattern. The antipattern is modeled using the empirical results of a controlled experiment on extreme programming (XP) that investigated the impact of developer personalities and temperaments on communication, collaboration-pair viability and effectiveness in pair programming. The resulting BN model provides the precise mathematical model of a project management antipattern and can be used to measure and handle uncertainty in mathematical terms","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ontologies are used in the integration of information resources by describing the semantics of the information sources with machine understandable terms and definitions. But, creating an ontology is a difficult and time-consuming process, especially in the early stage of extracting key concepts and relations. This paper proposes a method for domain ontology building by extracting ontological knowledge from UML models of existing systems. We compare the UML model elements with the OWL ones and derive transformation rules between the corresponding model elements. Based on these rules, we define an XSLT document which implements the transformation processes. We expect that the proposed method reduce the cost and time for building domain ontologies with the reuse of existing UML models
{"title":"A Method for Building Domain Ontologies based on the Transformation of UML Models","authors":"Hong-Seok Na, O-Hoon Choi, Jung-Eun Lim","doi":"10.1109/SERA.2006.4","DOIUrl":"https://doi.org/10.1109/SERA.2006.4","url":null,"abstract":"Ontologies are used in the integration of information resources by describing the semantics of the information sources with machine understandable terms and definitions. But, creating an ontology is a difficult and time-consuming process, especially in the early stage of extracting key concepts and relations. This paper proposes a method for domain ontology building by extracting ontological knowledge from UML models of existing systems. We compare the UML model elements with the OWL ones and derive transformation rules between the corresponding model elements. Based on these rules, we define an XSLT document which implements the transformation processes. We expect that the proposed method reduce the cost and time for building domain ontologies with the reuse of existing UML models","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}